Items Tagged with "Cyber Warfare"

"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...

"The Defense Advanced Research Projects Agency (DARPA) is requesting information on innovative technologies and approaches to secure the Nation’s infrastructure and to ensure the survival of the Department of Defense’s cyber capabilities in case of attack..."

"The center, which has been set up under the auspices of military intelligence unit 8200 has already conducted a series of 'soft' espionage missions, including hacking into Iran’s version of Facebook and other social networking sites..."

"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...

According to the U.S. Strategic Command, the DOD is in the midst of a global cyberspace crisis as foreign nation states and other actors, such as hackers, criminals, terrorists, and activists exploit DOD and other U.S. government computer networks to further a variety of ideological objectives...

The study of 10 million web application attacks shows automated attacks peak at 25,000 an hour. "The level of automation in cyber attacks continues to shock us. The sheer volume of attacks that can be carried out in such a short period of time is almost unimaginable to most businesses..."

"The continued failure to address and define the policies and legal authorities necessary for the Pentagon to operate in the cyberspace domain remains a significant gap in our national security that must be addressed," wrote Senators Levin and McCain to Defense Secretary Panetta...

"Tehran never did overcome the disruptions caused by Stuxnet or restore its centrifuges to smooth and normal operation as was claimed. Indeed, Iran finally resorted to the only sure-fire cure, scrapping all the tainted machines and replacing them with new ones..."

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...

If it was state sponsored hacking as the China connection really does lead me to believe, then we have a new problem, or perhaps this has been the case all along - that the state sponsored hackers have been within Anonymous, using them as cover. "Inj3ctor" has ties to Chinese hackers...

"This may have been a test of South Korea’s preparedness to mitigate cyberattacks, possibly by North Korea or their sympathizers... the attack itself was very limited and may have been utilized to test and observe how quickly the attack would be discovered, reverse engineered, and mitigated..."

"The U.S. military is hastening to seize the commanding military heights... and another Internet war is being pushed to a stormy peak. To protect [China's] Internet security, we must accelerate Internet defense development and accelerate steps to make a strong Internet army..."

"We've had 50 years in which we haven't really had to rethink what might happen in a war here. We need to think very hard about an actual strategy about how to win a war in which cyber weapons are prominently featured..."

"What does our government or other governments think is an effective deterrent or response to an all out cyber attack? Since we have no good definitions or protocols, I do think that the attack on Lockheed Martin is a sign of the future..."